• Title/Summary/Keyword: 프레임 동기

Search Result 368, Processing Time 0.028 seconds

An efficient acceleration algorithm of GPU ray tracing using CUDA (CUDA를 이용한 효과적인 GPU 광선추적 가속 알고리즘)

  • Ji, Joong-Hyun;Yun, Dong-Ho;Ko, Kwang-Hee
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.469-474
    • /
    • 2009
  • This paper proposes an real time ray tracing system using optimized kd-tree traversal environment and ray/triangle intersection algorithm. The previous kd-tree traversal algorithms search for the upper nodes in a bottom-up manner. In a such way we need to revisit the already visited parent node or use redundant memory after failing to find the intersected primitives in the leaf node. Thus ray tracing for relatively complex scenes become more difficult. The new algorithm contains stacks implemented on GPU's local memory on CUDA framework, thus elegantly eliminate the problems of previous algorithms. After traversing the node we perform the latest CPU-based ray/triangle intersection algorithm 'Plucker coordinate test', which is further accelerated in massively parallel thanks to CUDA. Plucker test can drastically reduce the computational costs since it does not use barycentric coordinates but only simple test using the relations between a ray and the triangle edges. The entire system is consist of a single ray kernel simply and implemented without introduction of complicated synchronization or ray packets. Consequently our experiment shows the new algorithm can is roughly twice as faster as the previous.

  • PDF

Development of Interactive Video Using Real-time Optical Flow and Masking (옵티컬 플로우와 마스킹에 의한 실시간 인터렉티브 비디오 개발)

  • Kim, Tae-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.98-105
    • /
    • 2011
  • Recent advances in computer technologies support real-time image processing and special effects on personal computers. This paper presents and analyzes a real-time interactive video system. The motivation of this work is to realize an artistic concept that aims at transforming the timeline visual variations in a video of sea water waves into sound in order to provide an audience with an experience of overlapping themselves onto the nature. In practice, the video of sea water waves taken on a beach is processed using an optical flow algorithm in order to extract the information of visual variations between the video frames. This is then masked by the silhouette of an audience and the result is projected on a gallery space. The intensity information is extracted from the resulting video and translated into piano sounds accordingly. This work generates an interactive space realizing the intended concept.

Design of an Architecture Pattern for Ajax-based Web Applications (Ajax기반 웹 응용을 위한 아키텍쳐 패턴 설계)

  • Kim, Hwang-Man;Kim, Yong-Goo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1057-1065
    • /
    • 2011
  • In order to achieve the ease of development and to facilitate the maintenance of codes for complex Ajax (Asynchronous Java Script and XML)-based web clients, this paper proposes a CVC (Communicator-View-Controller) architecture pattern by modifying the well-known MVC (Model-View-Controller) framework. By composing the Communicator of codes for asynchronous data retrieval, which is common to Ajax-based clients, the proposed architecture pattern is able to cut out the graphic design related codes to constitute the View layer. Based on such declarative generalization of complex web-client codes, Ajax-related codes can be easily modularized and efficiently reused in development and maintenance stages, and graphics design can be done separately regardless of the other business logic related codes development, resulting in highly efficient development and maintenance of complex Ajax-based web clients.

A Building Method of Designing National Cyber Security Governance Model Through Diagnosis of Operational Experience (정보보안체계 운영경험 진단을 통한 국가 사이버보안 거버넌스 모델 연구 방법)

  • Bang, Kee-Chun
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.205-212
    • /
    • 2018
  • This Study aims to propose a new information security governance model design method for streamlining security governance at national strategic level. The research method of this study is to diagnose our operational experience and to derive a new model design method. In the meantime, national information security activities were perceived to be focused on knowledge transfer, and motivation of activities and securing of executive power were weak. As a result, security blind spots and frequent occurrence of large security incidents have become unresolved challenges. National cyber security governance should be grouped together as a whole systematically from the upper policy to the lower level of performance under the responsibility of the national leader. Based on this approach, this study presented the comprehensive framework of Korean security governance model and embodied it into four architectural designs such as vision, goal, process, and performance, thus deriving the foundation for future national governance model design. Further research is needed to diagnose problems in life cycle flow, security policies based on environmental changes, and new frameworks in which all subjects participate.

Lane Information Fusion Scheme using Multiple Lane Sensors (다중센서 기반 차선정보 시공간 융합기법)

  • Lee, Soomok;Park, Gikwang;Seo, Seung-woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.142-149
    • /
    • 2015
  • Most of the mono-camera based lane detection systems are fragile on poor illumination conditions. In order to compensate limitations of single sensor utilization, lane information fusion system using multiple lane sensors is an alternative to stabilize performance and guarantee high precision. However, conventional fusion schemes, which only concerns object detection, are inappropriate to apply to the lane information fusion. Even few studies considering lane information fusion have dealt with limited aids on back-up sensor or omitted cases of asynchronous multi-rate and coverage. In this paper, we propose a lane information fusion scheme utilizing multiple lane sensors with different coverage and cycle. The precise lane information fusion is achieved by the proposed fusion framework which considers individual ranging capability and processing time of diverse types of lane sensors. In addition, a novel lane estimation model is proposed to synchronize multi-rate sensors precisely by up-sampling spare lane information signals. Through quantitative vehicle-level experiments with around view monitoring system and frontal camera system, we demonstrate the robustness of the proposed lane fusion scheme.

Open Services Environment capabilities for NGN Application (NGN 응용을 위한 개방형 서비스 환경 기능)

  • Lee, Won-Suk;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.685-688
    • /
    • 2008
  • A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users in this paper. we describe the trend of standardization activity related with open services environment capabilities which had been finally approved at September 2008 in ITU-T. ITU-T SG13 is responsible for studies relating to the architecture, evolution and convergence of next generation networks including frameworks and functional architectures, signalling requirements for NGN.

  • PDF

Virtual Optimal Design of Satellite Adapter in Parallel Computing Environment (병렬 컴퓨팅 환경 하에서 인공위성 어댑터 가상최적설계)

  • Moon, Jong-Keun;Yoon, Young-Ha;Kim, Kyung-Won;Kim, Sun-Won;Kim, Jin-Hee;Kim, Seung-Jo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.11
    • /
    • pp.973-982
    • /
    • 2007
  • In this paper, optimal design framework is developed by automatic mesh generation and PSO(Particle Swarm Optimization) algorithm based on parallel computing environment and applied to structural optimal design of satellite adapter module. By applying automatic mesh generation, it became possible to change the structural shape of adapter module. PSO algorithm was merged with parallel computing environment and for maximizing a computing performance, asynchronous PSO algorithm was developed and could reduce the computing time of optimization process. As constraint conditions, eigen-frequency and maximum stress was considered. Finally using optimal design framework, weight reduction of satellite adapter module is derived with satisfaction of structural safety.

An Error Control Scheme for Variable Length Traffic on Round Robin Style Real-Time Networks (라운드 로빈 실시간 네트워크에서의 가변 길이 트래픽을 위한 오류제어 기법)

  • Lee, Jung-Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.277-285
    • /
    • 2002
  • This paper proposes and analyzes an error control scheme for the transmission control based real-time communication, such as FDDI, TDMA, and wireless LAN, which delivers the message according to the round robin fashion after the off-line bandwidth allocation. Taking into account the time constraint of each message, the proposed error control scheme makes the receiver transmit the error report via asynchronous traffic while the sender resend the requested message via overallocated access time which is inevitably introduced by the bandwidth allocation procedure for hard real -time guarantee. The error control procedure does not interfere other real -time message transmissions. In addition, as each frame contains the size of the message it belongs, the receiver can recognize the end of completion of message transmission. This enables earlier error report to the receiver so that the sender can cope with more network errors. The analysis results along with simulation performed via SMPL show that the proposed scheme is able to enhance the deadline meet ratio of messages by overcoming the network errors. Using the proposed error control scheme, the hard real -time network can be built at cost lower than, but performance comparable to the expensive dual link network.

Online Users' Password Security Behavior : The Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior (온라인 사용자의 비밀번호 보호행위 : 공포 소구와 메시지 프레이밍 효과, 그리고 비밀번호 보호행위의 동기요인)

  • Park, Jaeyoung;Kim, Jeondo;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.147-165
    • /
    • 2017
  • Recently, there have been numerous issues about password breaches and it is becoming important for the users to manage their passwords. In practice, the online service provider are asking the online users to change their passwords periodically. However, majority of the users are not changing their passwords regularly, and this can increase the risk of password breach. The purpose of this study is to investigate whether 'fear appeals' and 'message framing' enhance the behavior of changing passwords by the online users. Furthermore, we identify the mechanism on how the behavior of changing passwords is enabled using protection motivation theory. The results of an online experiment show that the online users who are exposed to 'fear appeals' perceived a more vulnerability and severity of password breaches, which in turn, increased the intention of changing their password. In addition, we found that perceived severity of password breaches affect fear positively. Moreover, we found that fear has significant impact on the willingness of changing passwords. Finally, Message framing plays a moderating role between fear and change intentions. That is, in a situation where 'fear appeal' is presented, it means that 'gain framing' is more effective than 'loss framing' These findings suggest that the online service providers may need to use 'fear appeals' to the online users. Security managers can address issues related to the password breaches by carefully designing 'fear appeals'.

A Study in Program Development of Course Incorporated Education by Utilizing Robots in Elementary Schools (초등학교 교과통합 로봇활용교육 프로그램 개발에 관한 연구)

  • Park, Jung-Ho;Kim, Chul
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.1
    • /
    • pp.35-44
    • /
    • 2010
  • Robots have been recognized as effective tools to promote high level thinking such as creativeness and problem solving that are crucial in Intelligence & Information era. However, robot education in Korea is more concerned with assembling, traveling and programing, while robot education in foreign countries are incorporated with educational courses, being utilized in various ways. Essentially, robot is a multifunctioning device of planning, assembling, operation and problem solving. As it is able to provide practical educational experience, it will positively influence in motivation and accomplishment if being incorporated with educational courses. Therefore, this study compared domestic and foreign robot education cases, while establishing the framework of course incorporated robot education based on analysis of robot mechanism, the 7th curriculum and its activities. We developed robot utilizing educational program by each grade and subject. In addition, this program is reviewed by experts to verify its adequateness, reality and usefulness based on which it was revised and supplemented.

  • PDF